Analysis
-
max time kernel
178s -
max time network
171s -
platform
android_x64 -
resource
android-x64-arm64-20240611.1-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system -
submitted
13-06-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
a55b2ed02490254f92796a1b32607e10_JaffaCakes118.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
a55b2ed02490254f92796a1b32607e10_JaffaCakes118.apk
Resource
android-x64-20240611.1-en
General
-
Target
a55b2ed02490254f92796a1b32607e10_JaffaCakes118.apk
-
Size
2.0MB
-
MD5
a55b2ed02490254f92796a1b32607e10
-
SHA1
7972b440b28a93557cbc8d55f50bf88123f85f9e
-
SHA256
9b810cd2c0fd928830a3365c83bb51ebbb8755d8dcc01e331244bf47a7a81dea
-
SHA512
acb94411e50c545cd6b960596ddb3db49e3e3336a68c03621d2b34b2fac31cd81774270cd35e572d24a921e5cb2b162eabc275ea34782c12f6d5944ee4b6983a
-
SSDEEP
49152:rd2A7z0MPsWBTjOh8yAobZhfpu6YT7BV08Qd:rFz0M1jQ8UZynPBV0F
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.myappioc pid process /data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709 4466 com.myapp /data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709!classes2.dex 4466 com.myapp -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.myappdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.myapp
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709Filesize
2.1MB
MD5ec4d46c643c29ee1367bf791e701ada2
SHA1820d491b682ef5ea4634a73fef5987d00c276150
SHA256a1874afbe0441c906eaaebc03f9a7a647729c6e9e75a7cdb34bef7742438e0b4
SHA5124d351ab5365bbfcb01abebf9176d6ceb21f6cb56532412485d90524ea3f39207635bae8e4382bdd37959532b672ca249b2084529c8641109a6ff1c4f5a8f36a7
-
/data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709Filesize
408KB
MD56eef034d5ac3da6c619cddfb20df2e81
SHA11529d69d265f50717c1bf9ae7546b2a80831588a
SHA256930ec1fe7ff09ef6c66fda123e868d5e7989689fa17d1833e5a04716d296a6cc
SHA512ffe20e767be04cde31942228b939788edf0c0c89138b43703b983ffd05ad32350a762bc78410aa1e9e7a59cf0b3f05112001c1254e9ac0544cd9a4d9fe641d76
-
/data/user/0/com.myapp/cache/DA39A3EE5E6B4B0D3255BFEF95601890AFD80709!classes2.dexFilesize
4.5MB
MD5f2bdd37bca225c125cb8cdf59e8b70d3
SHA18744919e45d714b2ba75ef286eb3f20795e4bb78
SHA2569cab997e28849d98c628e9fc572ca29036b166c77d3e935ee492d565a303f5ae
SHA51267fdc6a1466ed8953c5ed409a2b810904d8351a3279043bc48fd6cb5290ba77bb732af7cc854b73948c26241a25f7de6acd6c90a1554d18e01aa91667e089768
-
/storage/emulated/0/Google/google.idFilesize
36B
MD5e76e30708ebff27860163c4b7553bfc1
SHA14bc4f9849df5080d9846f1a75003a4a3018f42b5
SHA2565a9c6a71bdefe4f0e400a52426733e507d3698ce8ce50e243a0cfcd9b9d0a360
SHA512dc8c2281054a8709699caf2e8dc706a0838f3fc60abd6b843e5743849c90b38327a63b073d36c11e30675d5cbc90bbb6561d05798a0caa1afeba5842c6d42119